rosa vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the rosa package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Race Condition

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • H
Asymmetric Resource Consumption (Amplification)

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • M
Misinterpretation of Input

*
  • H
Resource Exhaustion

*
  • H
Uncontrolled Recursion

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Handling of Highly Compressed Data (Data Amplification)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Resource Exhaustion

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Insufficient Entropy

*
  • H
Improper Authorization

*
  • M
Buffer Overflow

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • L
Resource Exhaustion

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Buffer Access with Incorrect Length Value

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
HTTP Response Splitting

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
CVE-2022-41715

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Use of Uninitialized Variable

*
  • H
Memory Leak

*
  • M
SQL Injection

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*